13Oct
NSA Contractor Arrest Highlights Risk from Insider Threats
Uncategorized

“The situation seems eerily similar to the Edward Snowden leak, and has drawn renewed attention to insider threats and the risks posed by authorized users granted access to sensitive information in corporate neman-1187171_1920-1078x516tworks.

…While insider attacks and leaks of sensitive data from the NSA make for very salacious headlines, insider threats are in no way limited to the NSA or government agencies. Every company has some information and data of a sensitive nature that should not be shared or seen outside the company, and every company faces the risk that an employee with access to that data could expose it—either intentionally or inadvertently.”

Read more: http://techspective.net/2016/10/11/nsa-contractor-arrest-highlights-risk-insider-threats/

Read More
06Oct
NSA case highlights growing concerns over insider threats
Uncategorized

“The arrest of a National Security Agency contractor charged with stealing highly classified material is yet the latest example of a trend that officials say can be every bit as dangerous as an outside hacker: the insider threat.

…insider threats pose a delicate and difficult challenge and can be hard to detect, especially since large amounts of data can be downloaded quickly and stored on tiny devices.”

Read more: https://www.washingtonpost.com/business/economy/nsa-case-highlights-growing-concerns-over-insider-threats/2016/10/06/61b90a5e-8bc7-11e6-bf8a-3d26847eeed4_story.html

nsa_pic

Read More
06Oct
NSA contractor charged with stealing top secret data
Uncategorized

“Rep. Adam B. Schiff (Calif.), the ranking Democrat on the House Intelligence Committee, said in a statement that Martin’s arrest made it ‘painfully clear that the Intelligence Community still has much to do to institutionalize reforms designed to protect in advance the nation’s sources and methods from insider threats.'”

Read more: https://www.washingtonpost.com/world/national-security/government-contractor-arrested-for-stealing-top-secret-data/2016/10/05/99eeb62a-8b19-11e6-875e-2c1bfe943b66_story.html

Read More
22Sep
BBC News: Malware-infected USB sticks in Australia
Uncategorized

“USB staustralian_usbsicks containing harmful malware have been left in Australian letterboxes, police in Victoria have warned.

…The devices are “extremely harmful” and should not be used, police say.

It is not uncommon for USB sticks to be used to carry and transmit destructive malware and viruses to computers.

Cybersecurity experts have called the technology “critically flawed“, and in 2014 demonstrated to the BBC how any USB device could be used to infect a computer without the user’s knowledge.”

Read more: http://www.bbc.co.uk/news/technology-37431335

Read More
15Jun
Gigavation featured at flagship Detroit Automotive Conference
Uncategorized

TU_Auto_Detroit_June2016_

Gigavation thought leadership on cyber security panel at flagship Detroit Automotive Conference

Read more:

http://www.tu-auto.com/detroit/

Read More
18Apr
Caution: Cyber Risks Ahead for Connected Cars
Uncategorized

“From sensors to computers to communications networks, the technology in automobiles today exposes them to an alarming array of potential cyberattacks.”

“By exploiting weaknesses in wireless communications systems or in devices that connect directly to cars (such as smartphones, insurance dongles, or diagnostic tools), hackers could conceivably gain access to data stored on a vehicle that describes its owner’s driving habits, current location, entertainment preferences, or daily schedule.”

“Newer connected vehicles represent an emerging target for hackers because these vehicles are essentially rolling ecosystems of unsecured technologies.”

Read more: http://deloitte.wsj.com/cio/2016/04/18/caution-cyber-risks-ahead-for-connected-cars/

Read More
10Feb
Industrial Hacking: How Cyber Crime Went Pro
Uncategorized

TheStreet_Feb2016“The scope, frequency and severity of hacks have increased with every passing year. One of the driving factors behind this, say security experts is a new corporatization and professionalism of hackers. …

‘The stealing of corporate meetings and notes to get a competitive advantage is ridiculously real,’ Barone added, ‘They’re stealing blueprints, because they want to see where this company is going to build next and what their security infrastructure looks like behind it.

Law firms, designers, factories, anyone who can have potentially valuable information can be a target.”

Read more: http://www.thestreet.com/story/13446854/1/industrial-hacking-how-cyber-crime-went-pro.html

Read More
24Jan
“Internet of Things security is so bad, there’s a search engine for sleeping kids”
Uncategorized

“Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams.”

“The cameras are vulnerable because they use the Real Time Streaming Protocol (RTSP, port 554) to share video but have no password authentication in place.”

“The consumers are saying ‘we’re not supposed to know anything about this stuff [cybersecurity],” he said. “The vendors don’t want to lift a finger to help users because it costs them money.”

“The bigger picture here is not just personal privacy, but the security of IoT devices,” security researcher Scott Erven told Ars Technica UK. “As we expand that connectivity, when we get into systems that affect public safety and human life—medical devices, the automotive space, critical infrastructure—the consequences of failure are higher than something as shocking as a Shodan webcam peering into the baby’s crib.”

Read More: http://arstechnica.com/security/2016/01/how-to-search-the-internet-of-things-for-photos-of-sleeping-babies/?utm_source=twitterfeed&utm_medium=linkedin

Read More
24Jan
Security Flaw Compromises Location of Nest Thermostat Owners
Uncategorized

Nest Thermostat“A security bug discovered by Princeton researchers leaked the location information of Nest Thermostat owners over the Internet.”

“This is not the first security vulnerability from Google’s sister company, Nest, and its first child, the Nest Learning Thermostat. Last year we reported on a 15-second USB hack that would give hackers full remote controls and access to information on the daily whereabouts of owners.”

“Even with these findings Grover considered Nest’s Thermostat to be “one of the more secure devices” in his test. It is not the sort of title that would instill confidence in the security of our future technology.”

Read More: http://www.msn.com/en-us/news/technology/security-flaw-compromises-location-of-nest-thermostat-owners/ar-BBoyymM

Read More
16Nov
Gigavation featured on Keynote Panel on Cybersecurity at Automotive Conference
Uncategorized

Gigavation leadership: Keynote Speaker on the Cybersecurity panel at the Automotive USA 2015 Conference alongside OEMs and other telematics experts.

http://www.tu-auto.com/fleet/conference-agenda.php

Atlanta, November 16-17, 2015

TU-Automotive

TU_Auto_Cyber_keynotepanel

Read More